Stuff from Exams I don't knw #4 Flashcards

(67 cards)

1
Q

Serverless Architecture

A

serverless architecture refers to a cloud computing model where the cloud provider manages the infrastructure, automatically scaling resources as needed. In this model, users don’t need to manage or provision servers; instead, they focus on writing code and deploying functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Management Components

A

Risk assessment, risk response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VXLAN

A

Virtual Extensible LAN - encapsulation protocol enabling switch created network segments to be stretched across subnets and geographical space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which component of IPSec allows multiple concurrent vpns?

A

ISAKMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Familiarity

A

AKA ‘liking’ used as a social engineering principle. Attempts to exploit native trust in something familiar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Temporal Protections - encryption

A

Process that marks encrypted traffic as valid for only a limited amount of time.

Used to prevent replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is Security Governance related to Acquisitions, divestitures, and governance committees?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RFC 6749

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scoping

A

Removing controls from a suggested baseline of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service Ticket

A

In Kerberos authentication, a service ticket is a time-limited credential provided by the Ticket Granting Server (TGS) after a user presents a valid Ticket Granting Ticket (TGT). This service ticket allows the user to access a specific network service, serving as proof of the user’s authenticated identity for the requested service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Ticket Granting Ticket?

A

Kerberos ticket that allows authenticated users to request access to network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Ticket Granting Server?

A

A Kerberos Ticket Granting Server (TGS) is a component in the Kerberos authentication system that issues service tickets to users after they have successfully obtained a Ticket Granting Ticket (TGT) from the Authentication Server (AS). The TGS plays a key role in facilitating secure access to various services within a network by providing users with tickets that authenticate their identity to those servic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Randomized masking

A

An anonymization technique. When done correctly cannot be reversed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What best describes a Service Account?

A

Used to run applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wired Extension

A

A single added WAP used to extend a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise Extension

A

Topology where wireless network is designed to support large envioronment with one SSID, numerous APs. Ofeten used to extend a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What port is used for SQL

A

1433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IR Mitigate phase

A

Contain Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IR Recovery phase

A

Restore system back to original state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IR Remediation phase

A

Root Cause Analysis, patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IR Response phase

A

Gather the IR team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Software test coverage that verifies every if statement in code has been executed under all ‘if’ and ‘else’ conditions?

A

Branch coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Split-response attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cache Poisoning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DCE and IDL??
DCOM, RPC, CORBA....
26
WiFi uses _______ for collision detection
CSMA/CA
27
TM symbol vs R symbol
TM is used to indicate a trademark that isn't yet registered with USPTO R is a Registered Trademark
28
What is a Web Development Framework?
A Code package used to provide many of the functions a webpage will need, such as Angular Js, Flask, Django, Symfony, Express.
29
OIDC/OpenD Connect
Uses the RFC6749 OAuth framework, but is maintained by the openid foundation.
30
Is HVAC considered a security control?
Yes, because it cPontrols temperature in server rooms.
31
What is the primary goal of Asset Inventory Managemetn
Prevent Losses.
32
ECDSA Elliptic Curve Digital Signature Alg.
Elliptic Curve Cryptography when used to produce digital signatures.
33
Distributed Data Model
Data is stored in more than one DB, but is still logically connected. User perceives the DB as a single entity, even though it comprises numerous parts over a network.
34
Branch Coverage
Evaluates that every 'if' statement has been executed.
35
What does Baselining provide?
a minimum level of security. Meant to be a starting point, does not ensure maximum security.
36
Should you clear and purge on tapes?
You can, but this will reduce the lifetime of the tapes. Not the best option.
37
TCP Wrapper
An application that can serve as a basic firewall by restricting access based on user IDs or system IDs. (I think) typically only used in Linux and Unix environments
38
Kerberos Port
88
39
TKIP
Introduced with WPA as a replacement for weaker WEP encryptions. Now considered deprecated.
40
SAE
Introduced in WPA3, simultaneous authentication of equals. Removes the need for a key exchange.
41
OpenID Connect and JSON tokens, what is the relationship?
JSON Tokens used to pass information back and forth between entities.
42
Fileless Malware
Malware that leaves no trace.
43
SCAP - CCE? Is CCE a thing?
Yes - stands for Common Configuration Enumeration. A Naming system for system configuration issues.
44
VMS Vendor Management System
Vendor Management System: Assists with mgmt and procurement of staffing services, hardware, software, and other needed products/services.
45
OFDM, DSS, FHSS??
46
DNSSEC and PKI?
DNSSEC uses certs to perform mutual authentication of peer DNS servers.
47
Embedded System?
Is a computer implemented as part of a larger system. Typically designed around a limited set of specific functions in relation to the larger product it is a component of.
48
ISA
ISA: Interconnection Security Agreement formal declaration of the security stance, risk, and technical requirements to link two organizations' IT infrastructures.
49
Audit vs Assessment
50
Can a WAF be used in lieu of yearly web vuln. assessments in PCI??
Yes
51
Does Configuration management account for changes in already-running systems?
NO - it's only used to ensure systems are similarly deployed.
52
Final step of Fagan Inspection?
Follow-up
53
Can a Configuration Management System assist in Hardware Asset Mgmt?
Yes
54
BPA
Business Partners Agreement: Contract between two entities dictating the terms of the business relationship.
55
SLR
Service Level Agreement: Statement of expectations of service and performance from the product or service of a vendor.
56
What is DRM geared towards protecting?
Copyrighted materials
57
Tokenization vs Psedonymization
Token - third party holds mappings Pseudonymization - internal DB hold mappings
58
BiometricsL: one-to-many
Identification
59
Biometrics: one-to-one
authentication
60
Tunnel Mode VPN connects ____ to ____?
Networks to Networks, or Hosts to Networks
61
Transport Mode VPN connects ____ to ____?
Hosts to hosts.
62
DB - Concurrency?
Concurrency locks the data elements while a change is processing, so that a second operation cannot be run against the data at the same time.
63
Risk Assignment
Synonymous with Risk Transference (i.e cyberinsurance)
64
Is a VPN an example of network segmentation?
NO
65
Cloud Security Policy - CSP
Rules how the provider provides service.
66
Software - statement coverage
Test to verify that every line of code is executed.
67
FHSS
Frequency Hopping Spread Spectrum (FHSS) is a transmission technology in which the data signal is modulated by a narrowband carrier signal which changes frequency ("hops") over a wide band of frequencies.